Author of the publication

Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach.

, , , , and . OTM Conferences (2), volume 5332 of Lecture Notes in Computer Science, page 1052-1068. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A family of case studies on business process mining using MARBLE., , , and . J. Syst. Softw., 85 (6): 1370-1385 (2012)Un entorno integrado para la reingeniería., , and . JISBD, page 195-202. Thomson, (2005)Database Schema Elicitation to Modernize Relational Databases., , , and . ICEIS (1), page 126-132. SciTePress, (2012)Implementing Business Process Recovery Patterns through QVT Transformations., , and . ICMT@TOOLS, volume 6142 of Lecture Notes in Computer Science, page 168-183. Springer, (2010)Diagnosis of software erosion through fuzzy logic., , and . CIDUE, page 49-56. IEEE, (2011)Decreasing the cost of mutation testing with second-order mutants., , and . Softw. Test. Verification Reliab., 19 (2): 111-131 (2009)An MDA-based approach for database re-engineering., , and . J. Softw. Maintenance Res. Pract., 19 (6): 383-417 (2007)Automated generation of oracled test cases with regular expressions and combinatorial techniques., , , and . J. Softw. Evol. Process., (2020)GreCo: Green code of ethics., , , , , , and . J. Softw. Evol. Process., (2017)Evaluating GSD-Aware: A Serious Game for Discovering Global Software Development Challenges., , , and . ACM Trans. Comput. Educ., 19 (2): 14:1-14:23 (2019)